咨询与建议

限定检索结果

文献类型

  • 1,105 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,991 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,291 篇 工学
    • 700 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 185 篇 电子科学与技术(可...
    • 176 篇 信息与通信工程
    • 174 篇 电气工程
    • 123 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 117 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 85 篇 光学工程
    • 79 篇 网络空间安全
    • 68 篇 机械工程
    • 59 篇 仪器科学与技术
    • 56 篇 核科学与技术
    • 55 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 43 篇 动力工程及工程热...
    • 35 篇 冶金工程
  • 1,019 篇 理学
    • 554 篇 物理学
    • 388 篇 数学
    • 126 篇 统计学(可授理学、...
    • 121 篇 化学
    • 116 篇 生物学
    • 79 篇 地球物理学
    • 60 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 40 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 41 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 training
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 110 篇 university of sc...
  • 100 篇 university of ch...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 hebei normal uni...
  • 99 篇 state key labora...
  • 96 篇 yunnan observato...
  • 87 篇 department of ph...
  • 87 篇 key laboratory f...
  • 86 篇 school of physic...
  • 83 篇 center for astro...
  • 82 篇 college of physi...
  • 81 篇 school of physic...
  • 80 篇 institute of fro...
  • 80 篇 moscow institute...
  • 79 篇 school of physic...
  • 79 篇 national space s...
  • 77 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 69 篇 kuleshov d.
  • 68 篇 liu d.
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 66 篇 liu b.
  • 65 篇 bao y.w.
  • 64 篇 li cheng
  • 64 篇 li xin
  • 64 篇 hu h.b.
  • 62 篇 liu h.d.
  • 62 篇 mao j.r.

语言

  • 1,798 篇 英文
  • 152 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced computing"
1991 条 记 录,以下是41-50 订阅
排序:
Towards optimized tensor code generation for deep learning on sunway many-core processor
收藏 引用
Frontiers of Computer Science 2024年 第2期18卷 1-15页
作者: Mingzhen LI Changxi LIU Jianjin LIAO Xuegui ZHENG Hailong YANG Rujun SUN Jun XU Lin GAN Guangwen YANG Zhongzhi LUAN Depei QIAN State Key Laboratory of Software Development Environment Beijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China National University of Singapore Singapore 119077Singapore State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214000China Science and Technology on Special System Simulation Laboratory Beijing Simulation Center Beijing 100854China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China
The flourish of deep learning frameworks and hardware platforms has been demanding an efficient compiler that can shield the diversity in both software and hardware in order to provide application *** the existing dee... 详细信息
来源: 评论
A Review of Few-Shot Network Traffic Classification Based on Deep Learning
A Review of Few-Shot Network Traffic Classification Based on...
收藏 引用
2023 International Conference on Mechatronics and Intelligent Control, ICMIC 2023
作者: Yang, Kai Wang, Ruo Nan Meng, Qi Meng, Long Qi, Zan Li, Xue Fei, Jin Long State Key Laboratory of Mathematical Engineering And Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou China
At present, deep learning has achieved excellent performance in the field of network traffic classification. However, deep learning relies on massive data-driven classification models. When the data set is small, it i... 详细信息
来源: 评论
PFCA: An Intelligent Method of Multidimensional User Profile Construction and Application  7
PFCA: An Intelligent Method of Multidimensional User Profile...
收藏 引用
7th International Conference on Big Data Analytics, ICBDA 2022
作者: Xia, Yi Zhou, Gang Luo, Junyong Lan, Mingjing Chen, Xiaohui Wang, Shiyu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
User profile plays an important role in analyzing high influencers in the era of big data. For example, the profile can help the political strategists to scrutinize the performance of a candidate or party and overcome... 详细信息
来源: 评论
A Research and Verification of MFC Framework-aware Virus Infection Technology  3
A Research and Verification of MFC Framework-aware Virus Inf...
收藏 引用
3rd International Conference on Computer Vision, Image and Deep Learning and International Conference on Computer engineering and Applications, CVIDL and ICCEA 2022
作者: Guo, Wang Li, Yang Sha, Zihan Bu, Wenjuan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Portable Executable (PE) virus technology is an important threat factor in the field of network security. With continuous upgrading of malware detection technology, virus infection technology will also gradually evolv... 详细信息
来源: 评论
A Malware Classification Method based on Attentive Bidirectional Model  7
A Malware Classification Method based on Attentive Bidirecti...
收藏 引用
7th International Conference on Intelligent computing and Signal Processing, ICSP 2022
作者: Gui, Hairen Liu, Fudong Zhang, Chunyan Tang, Ke State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Deep learning techniques have achieved significant improvements in malware analysis application, such as malware detection, malware classification and vulnerability mining. Convolutional neural network (CNN) is applie... 详细信息
来源: 评论
An Abnormal Domain Name Generation Method Based on a Character-Level Model  4
An Abnormal Domain Name Generation Method Based on a Charact...
收藏 引用
4th International Conference on Robotics, Intelligent Control and Artificial Intelligence, RICAI 2022
作者: Wu, Chunbing Fei, Jinlong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Internet technology develops by leaps and bounds, new types of botnet attacks are springing up. Currently, most malware are stealthy when implementing attacks since they can bypass detection strategies such as blackli... 详细信息
来源: 评论
A Tree-based Structure Mutation Method for Network Protocol Fuzzing  6
A Tree-based Structure Mutation Method for Network Protocol ...
收藏 引用
2021 6th International Conference on Information Science, Computer Technology and Transportation, ISCTT 2021
作者: Yang, Rui Jing, Jing Qi, Xuyan Zheng, Hongbing State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
It is difficult to fuzz the protocol because the format of network protocol is complex and often involves syntax and semantic constraints. Traditional fuzzing often makes a trade-off between the validity of protocol m... 详细信息
来源: 评论
A PV-DM-based feature fusion method for binary malware clustering  4
A PV-DM-based feature fusion method for binary malware clust...
收藏 引用
4th International Conference on Communications, Information System and Computer engineering, CISCE 2022
作者: Gui, Hairen Zhang, Chunyan Huang, Yizhao Liu, Fudong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Utilizing NLP methods in malware classification or clustering applications is a hotspot in malware analysis. Binary malware embedding has become an important direction and basis for malware analysis. Existing binary m... 详细信息
来源: 评论
A Survey of Available Information Recovery of Binary Programs Based on Machine Learning  5
A Survey of Available Information Recovery of Binary Program...
收藏 引用
5th IEEE International Conference on Artificial Intelligence and Big Data, ICAIBD 2022
作者: Shao, Wenqiang Yang, Qichao Guo, Xixi Cai, Ruijie State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
A binary program is an executable file obtained by compiling the source code. In order to reduce the size of software or prevent reverse engineering, software publishers usually only release executable files that have... 详细信息
来源: 评论
Multi-protocol comprehensive topology probe technology under non-cooperative conditions
Multi-protocol comprehensive topology probe technology under...
收藏 引用
2022 International Symposium on Computer Applications and Information Systems, ISCAIS 2022
作者: Lu, Xuanting Yang, Qichao Liu, Shengli Yang, Pengfei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the rapid development of the Internet and the increasingly complex and diverse network environment, it is of great significance to quickly and accurately obtain the topology environment of the target network for ... 详细信息
来源: 评论